Sciweavers

151 search results - page 20 / 31
» his 2009
Sort
View
ISORC
2009
IEEE
15 years 4 months ago
From Requirements to Code Revisited
In his article entitled "From Play-In Scenarios to Code: An Achievable Dream", David Harel presented a development schema that makes it possible to go from high-level us...
Tewfik Ziadi, Xavier Blanc, Amine Raji
WG
2009
Springer
15 years 4 months ago
Distance d-Domination Games
Abstract. We study graph searching games where a number of cops try to capture a robber that is hiding in a system of tunnels modelled as a graph. While the current position of the...
Stephan Kreutzer, Sebastian Ordyniak
77
Voted
WISA
2009
Springer
15 years 4 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
ECSQARU
2009
Springer
15 years 4 months ago
Extracting the Core of a Persuasion Dialog to Evaluate Its Quality
: A persuasion dialog is a dialog in which agents exchange arguments on a subject. In this kind of dialog, the agents disagree about the status of the subject and each one tries to...
Leila Amgoud, Florence Dupin de Saint-Cyr
MHCI
2009
Springer
15 years 4 months ago
Eyes-free overviews for mobile map applications
We outline two new auditory interaction techniques which build upon existing visual techniques to display off-screen points of interest (POI) in map based mobile computing applic...
David K. McGookin, Stephen A. Brewster